Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2022 13:15
Static task
static1
Behavioral task
behavioral1
Sample
Payment Slip_CityBank010922.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Payment Slip_CityBank010922.exe
Resource
win10v2004-20220812-en
General
-
Target
Payment Slip_CityBank010922.exe
-
Size
230KB
-
MD5
12efd73394350c0076c6839c475a8821
-
SHA1
2f62d39d5742fa95e49b1cffce09bcf0b5638993
-
SHA256
9ccd495500c30bd78504986105407a90a33189abba44925eb0877b494693026c
-
SHA512
45c48509945314723844fc6af2e528121c3b7ded541ffe79106ea70540556269afcb26720b52559d8677425fc7a0f460abba6f5dd138580bf5ea1795a0fdac11
-
SSDEEP
3072:nTN/T7gqPHIvuvHQFpaIYkKEPIFJzE17vte:F5VHsaIYkb
Malware Config
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/3676-152-0x0000000000720000-0x000000000073A000-memory.dmp family_stormkitty -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Payment Slip_CityBank010922.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lxspkri = "\"C:\\Users\\Admin\\AppData\\Roaming\\Tpybod\\Lxspkri.exe\"" Payment Slip_CityBank010922.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 31 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2676 set thread context of 2460 2676 Payment Slip_CityBank010922.exe 85 PID 2460 set thread context of 3676 2460 InstallUtil.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AppLaunch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4912 powershell.exe 4912 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2460 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2676 Payment Slip_CityBank010922.exe Token: SeDebugPrivilege 4912 powershell.exe Token: SeDebugPrivilege 3676 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2460 InstallUtil.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2676 wrote to memory of 4912 2676 Payment Slip_CityBank010922.exe 82 PID 2676 wrote to memory of 4912 2676 Payment Slip_CityBank010922.exe 82 PID 2676 wrote to memory of 4912 2676 Payment Slip_CityBank010922.exe 82 PID 2676 wrote to memory of 2460 2676 Payment Slip_CityBank010922.exe 85 PID 2676 wrote to memory of 2460 2676 Payment Slip_CityBank010922.exe 85 PID 2676 wrote to memory of 2460 2676 Payment Slip_CityBank010922.exe 85 PID 2676 wrote to memory of 2460 2676 Payment Slip_CityBank010922.exe 85 PID 2676 wrote to memory of 2460 2676 Payment Slip_CityBank010922.exe 85 PID 2676 wrote to memory of 2460 2676 Payment Slip_CityBank010922.exe 85 PID 2676 wrote to memory of 2460 2676 Payment Slip_CityBank010922.exe 85 PID 2676 wrote to memory of 2460 2676 Payment Slip_CityBank010922.exe 85 PID 2460 wrote to memory of 3676 2460 InstallUtil.exe 86 PID 2460 wrote to memory of 3676 2460 InstallUtil.exe 86 PID 2460 wrote to memory of 3676 2460 InstallUtil.exe 86 PID 2460 wrote to memory of 3676 2460 InstallUtil.exe 86 PID 2460 wrote to memory of 3676 2460 InstallUtil.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip_CityBank010922.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip_CityBank010922.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3676
-
-